A malware campaign dubbed InterPlanetary Storm is hiding its network activity among legitimate traffic by using a P2P network for its command-and-control communications.
Open-source vulnerabilities are on the rise, but enterprises are struggling to effectively prioritize and remediate these threats.
Researchers spotted a phishing campaign delivering a multi-feature, open-source remote administration tool known as Babylon RAT.
A cryptomining malware campaign originally discovered in January is now using the EternalBlue exploit to target users in Asia, according to security researchers.
Like any relationship, DevSecOps works best when there is a solid commitment, open communication and strong resolve in the face of challenges.
A new reverse proxy tool called Modlishka can easily automate phishing attacks and bypass two-factor authentication (2FA) — and it's available for download on GitHub.
Given the historic data breaches, widespread vulnerabilities and onslaught of data privacy regulations that affected businesses around the world in 2018, security culture is more crucial than ever.
A new attack group known as Gallmaker spied on military and government organizations by employing living-off-the-land tactics.
To secure products that use open source components, organizations must first take stock of how much of this code they are using in their products.
Researchers observed 13 malware attacks targeting iPhone users in India that exploited open source mobile device management (MDM) tools to breach corporate devices.